Welcome to VOX-Pol’s online Library, a research and teaching resource, which collects in one place a large volume of publications related to various aspects of violent online political extremism.
Our searchable database contains material in a variety of different formats including downloadable PDFs, videos, and audio files comprising e-books, book chapters, journal articles, research reports, policy documents and reports, and theses.
All open access material collected in the Library is easy to download. Where the publications are only accessible through subscription, the Library will take you to the publisher’s page from where you can access the material.
We will continue to add more material as it becomes available with the aim of making it the most comprehensive online Library in this field.
If you have any material you think belongs in the Library—whether your own or another authors—please contact us at firstname.lastname@example.org and we will consider adding it to the Library. It is also our aim to make the Library a truly inclusive multilingual facility and we thus welcome contributions in all languages.
A War of Keywords: How Extremists are Exploiting the Internet and What to do About It
the keywords, or search terms, people use to
find information on Google; secondly, looking at the data
demonstrating links going into a selection of known extremist
websites in order to understan...
Tweet... If You Dare: How Counter-Terrorism Laws Restrict Freedom of Expression in Spain
and musicians have been prosecuted
under Article 578 of the Spanish
Criminal Code, which prohibits “glorifying
terrorism” and “humiliating the victims
of terrorism”. Although this provision
was first introduced in ...
Anti-Semitic Targeting of Journalists During the 2016 Presidential Campaign
MEDIA DECLINE VOX Pol
Understanding Violent Extremism: Messaging and Recruitment Strategies on Social Media in the Philippines
|Violent extremist activity on social media in the Philippines is a relatively new phenomenon in the complex conflict environment that exists in the southern part of the country. The rise of online violent extremism emerged despite the Philippines’ significant strides in the Mindanao peace process. The 2014 Comprehensive Agreement on the Bangsamoro between the government and the MILF was a landmark achievement. Yet a number of armed groups rejected the deal, many of which are now engaged in online extremism. The apparent affiliation of these groups with issues beyond Mindanao and the Philippine state signaled a potential new era of conflict in the country. With these concerns as a backdrop, The Asia Foundation and Rappler worked together to explore how young Filipinos interact with social media networks, and look into the prevalence and characteristics of violent extremist messaging and recruitment in the Philippines in 2018.|
What are the Responsibilities of Tech Companies in an Age of International Terrorism?
|2016||Brimmer, E., Pielemeier, J., Brunner, L. and Walden, A.||Video|
|Cosponsored by the Software & Information Industry Association (SIIA) and the Greater Washington, DC Chapter of the Internet Society (ISOC-DC). This Policy Forum is convened by Dr. Susan Aaronson (IIEP/GWU) and Dr. Mark MacCarthy (SIIA).|
- Professor Esther Brimmer, Professor of Practice of International Affairs, GWU, and former Assistant Secretary of State for International Organizations
- Jason Pielemeier, Business and Human Rights Section Lead, Bureau of Democracy, Human Rights, and Labor, U.S. Department of State
- Lisl Brunner, Policy and Learning Director, Global Network Initiative
- Alexandria Walden, Public Policy & Gov't Relations Counsel, Google
Moderator: Dr. Mark MacCarthy, Senior Vice President for Public Policy, Software & Information Industry Association
Generalized Gelation Theory Describes Onset of Online Extremist Support
|2018||Manrique,P., Zheng, M., Cao,Z., Restrepo, E., Johnson, N.F.||Article|
|We introduce a generalized form of gelation theory that incorporates individual heterogeneity and show that it can explain the asynchronous, sudden appearance and growth of online extremist groups supporting ISIS (so-called Islamic State) that emerged globally post-2014. The theory predicts how heterogeneity impacts their onset times and growth profiles and suggests that online extremist groups present a broad distribution of heterogeneity-dependent aggregation mechanisms centered around homophily. The good agreement between the theory and empirical data suggests that existing strategies aiming to defeat online extremism under the assumption that it is driven by a few “bad apples” are misguided. More generally, this generalized theory should apply to a range of real-world systems featuring aggregation among heterogeneous objects.|
Down the (White) Rabbit Hole The Extreme Right and Online Recommender Systems
|2014||O’Callaghan D., Greene D., Conway M., Carthy J. and Cunningham P.||VOX-Pol Publication|
|In addition to hosting user-generated video content, YouTube provides recommendation services, where sets of related and recommended videos are presented to users, based on factors such as co-visitation count and prior viewing history. This article is specifically concerned with extreme right (ER) video content, portions of which contravene hate laws and are thus illegal in certain countries, which are recommended by YouTube to some users. We develop a categorization of this content based on various schema found in a selection of academic literature on the ER, which is then used to demonstrate the political articulations of YouTube’s recommender system, particularly the narrowing of the range of content to which users are exposed and the potential impacts of this. For this purpose, we use two data sets of English and German language ER YouTube channels, along with channels suggested by YouTube’s related video service. A process is observable whereby users accessing an ER YouTube video are likely to be recommended further ER content, leading to immersion in an ideological bubble in just a few short clicks. The evidence presented in this article supports a shift of the almost exclusive focus on users as content creators and protagonists in extremist cyberspaces to also consider online platform providers as important actors in these same spaces.|
The Supremacy of Online White Supremacists – an Analysis of Online Discussions by White Supremacists
|2015||Wong, M.A., Frank, R. and Allsup, R.||Journal|
|A content analysis was conducted on five different white supremacist online forums to observe the discourse and types of activities occurring within. In addition, web link analysis was conducted on the forums to identify the presence of external links being posted and discussed by members. We found that members used the forums primarily for information provision, recruitment and networking. Based on these results, we discuss the implications that online hate speech have within offline settings, and the affects these activities have on Canadian citizens in light of the recent repeal of section 13 of the Canadian Human Rights Act (1985), the primary tool in Canada with which to deal with hate speech and other activities observed. The insights extracted from this research have provided novel insight into the sentiments and activities of the white supremacist movement online, a relatively unexplored venue of hate speech and propaganda online.|
Anders Behring Breivik’s use of the Internet and social media
|2013||Aasland Ravndal, J.||Article|
|Did the Internet play a decisive role in Anders Behring Breivik’s violent radicalization? It has proven difficult to understand if and how the Internet influences radicalization processes leading to political violence (Conway 2012). The Internet constitutes only one out of a wide range of factors with a potential influence on radical and violent behavior. We also lack detailed empirical data about the online lives of modern terrorists. |
The case of the Norwegian far-right terrorist Anders Behring Breivik offers unique insights into the online activities of a terrorist who used the Internet and social media in almost every thinkable way. Not only did Breivik compile his 1516-pages long compendium based exclusively on Internet sources. Before the attacks, he was also an active discussant on a number of mainstream and extremist Internet forums, and a highly dedicated online gaming enthusiast.
This article reviews new sources on Breivik’s Internet adventures and road to militancy. It is primarily based on Breivik’s original posts and comments on various Internet discussion forums between 2002 and 2011. In addition, Breivik’s trial hearings introduced a wealth of new information regarding his use of the Internet. Finally, the article draws on a collection of Breivik’s private e-mails which was forwarded by Norwegian hackers to a Norwegian journalist six days after the terrorist attacks. A synthesis of the more than 7000 e-mails was later published as a book (Stormark 2012).
A key finding in this study is that Breivik likely never discussed his terrorist plans with anyone online. Moreover, his comments on various Internet forums do not stand out as particularly when compared to typical far-right online discourse. In other words, Norwegian security authorities would likely not react to his online postings even if he was being monitored.
Breivik’s online posts also indicate that his critical views on Islam and socialism had been established long before the so-called counterjihad blogs were created. This means that these blogs may have played a less decisive role for Breivik’s early radicalization than assumed by many. Later on, however, these blogs certainly strengthened Breivik’s radical thinking, although they come across as far less radical than his own ideological statements after 22 July.
Breivik’s e-mail correspondence shows that he first and foremost wanted to become a professional author and publisher. He proposed to establish a so-called cultural conservative paper journal together with Norwegian bloggers he admired, who were also critical of Islam and multiculturalism. He also tried to impress the Norwegian blogger Peder Are Nøstvold Jensen, better known as Fjordman, with his book project, but was given a cold shoulder. The fact that he was rejected by several of the people he looked up to may have had a decisive influence on his violent radicalization.
Breivik gathered all the necessary information to build his bomb online. He also financed the terrorist attacks through an online company, and used the Internet, in particular e-Bay, to buy materials such as body armor, weapons components and bomb ingredients. Breivik also systematically used social media platforms such as Facebook and Twitter for propaganda purposes.
Finally, Breivik was an extremely dedicated online gaming enthusiast. Playing online games dominated his daily life during the years leading up to the attacks. One cannot dismiss theories that the extreme amount of time spent on playing online games while being isolated from friends and relatives may have had an impact on his disposition to engage in extreme violence.
In the following sections, this article article describes Breivik’s use of the Internet and social media along four dimensions: (1) online radicalization, (2) online gaming, (3) online attack preparations, and (4) online propaganda.
Steganography and Terrorist Communications
|2017||Abdoun, A. and Ibrahim, J.||Journal|
|Steganography is the art and science of|
hiding the fact that communication is taking place by
hiding information in other information’ (Johnson).
According to nameless “U.S. officials and experts”
and “U.S. and foreign officials,” terrorist groups
are “hiding maps and photographs of terrorist
targets and posting instructions for terrorist
activities on sports chat rooms, pornographic
bulletin boards and other Web sites”. This paper
informs the reader how an innocent looking digital
image hides a deadly terrorist plan, which can
destroy the world just in a click of a mouse. It also
describes and discusses the process of secret
communication known as steganography. The
crucial argument here is that terrorists are most
likely to be employing digital steganography to
facilitate secret intra-group communication as has
been claimed. This is mainly because the use of
digital steganography by terrorist is both technically
and operationally dubious. The most important part
this paper discusses is that terrorist are likely to
employ low-tech steganography such as semagrams
and null chippers instead. It investigates the
strengths of image steganography and the reasons
why terrorists are relying on it so much.
Digital Terrorism and Hate 2012: The Power of Social Networking in the Digital Age
|2012||Abraham, R. and Rick Eaton, C.||Report|
|Analysis of 'digital terrorism' and hate on the Internet|
Understanding ISIS Myth and Realities
|Published on May 29, 2015|
This video was streamed live by DMAPLab MIGS on 26 May 2015.
The Islamic State, also known as ISIS or ISIL, has become a household name because it films its atrocities and posts them online thanks to social media platforms such as Twitter and YouTube.
Western countries and Arab states appear to be united and see the group as a threat to international peace and security. But what do we really know about ISIS? What should the international community do to cripple ISIS' on the battlefield?
Max Abrahms, professor of political science at Northeastern University and member at the Council on Foreign Relations, offers a unique perception of the relationship between the Islamic State’s propaganda and its success as an organisation.
White Supremacists, Oppositional Culture and the World Wide Web
|2005||Adams, J. and Roscigno, V.J.||Journal|
|Over the previous decade, white supremacist organizations have tapped into the ever emerging possibilities offered by the World Wide Web. Drawing from prior sociological work that has examined this medium and its uses by white supremacist organizations, this article advances the understanding of recruitment, identity and action by providing a synthesis of interpretive and more systematic analyses of thematic content, structure and associations within white supremacist discourse. Analyses, which rely on TextAnalyst, highlight semantic networks of thematic content from principal white supremacist websites, and delineate patterns and thematic associations relative to the three requisites of social movement culture denoted in recent research - namely identity, interpretational framing of cause and effect, and political efficacy. Our results suggest that nationalism, religion and definitions of responsible citizenship are interwoven with race to create a sense of collective identity for these groups, their members and potential recruits. Moreover, interpretative frameworks that simultaneously identify threatening social issues and provide corresponding recommendations for social action are employed. Importantly, and relative to prior work, results how how the interpretation of problems, their alleged causes and the call to action are systematically linked. We conclude by discussing the framing of white supremacy issues, the organizations' potential for recruitment, and how a relatively new communication medium, the Internet, has been cheaply and efficiently integrated into the white supremacist repertoire. Broader implications for social movement theory are also explored.|
One Apostate Run Over, Hundreds Repented: Excess, Unthinkability, and Infographics from the War with I.S.I.S.
|Compared to the more spectacular elements of its media repertoire—the slick recruitment campaigns on social media, the artfully composed battlefield footage, the grisly executions—I.S.I.S.’s infographics may seem dull, even trivial. Indeed, these data visualizations have gone largely unremarked, eliciting more bemusement than serious consideration. Against the tendency to discount these images, however, I argue that when I.S.I.S. turns toward charts and diagrams to represent its operations, it launches a stealthy but substantial epistemological challenge to media outlets that depict it as backward and irrational and rely on command of information as an index of Western power. Comparing infographics produced about I.S.I.S. and those produced by the group, I demonstrate that, despite their obvious differences, both types of infographics evince common preoccupations. Like Western news sources, I.S.I.S. creates infographics to map attacks, plot territorial gains, tally and categorize casualties, and track the types of weapons deployed. News media and I.S.I.S. infographics diverge primarily in their affective resonance, as similar information signifies in radically different ways. Ultimately, by producing and circulating these infographics, I.S.I.S. renders simultaneously renders itself more and less intelligible to outsiders: encapsulating its story while confounding prevailing representations as it weaponizes information.|
Using KNN and SVM Based One-Class Classifier for Detecting Online Radicalization on Twitter
|2015||Agarwal, S. and Sureka, A.||Chapter|
|Twitter is the largest and most popular micro-blogging website on Internet. Due to low publication barrier, anonymity and wide penetration, Twitter has become an easy target or platform for extremists to disseminate their ideologies and opinions by posting hate and extremism promoting tweets. Millions of tweets are posted on Twitter everyday and it is practically impossible for Twitter moderators or an intelligence and security analyst to manually identify such tweets, users and communities. However, automatic classification of tweets into pre-defined categories is a non-trivial problem problem due to short text of the tweet (the maximum length of a tweet can be 140 characters) and noisy content (incorrect grammar, spelling mistakes, presence of standard and non-standard abbreviations and slang). We frame the problem of hate and extremism promoting tweet detection as a one-class or unary-class categorization problem by learning a statistical model from a training set containing only the objects of one class . We propose several linguistic features such as presence of war, religious, negative emotions and offensive terms to discriminate hate and extremism promoting tweets from other tweets. We employ a single-class SVM and KNN algorithm for one-class classification task. We conduct a case-study on Jihad, perform a characterization study of the tweets and measure the precision and recall of the machine-learning based classifier. Experimental results on large and real-world dataset demonstrate that the proposed approach is effective with F-score of 0.60 and 0.83 for the KNN and SVM classifier respectively.|
Topic-Specific YouTube Crawling to Detect Online Radicalization
|2015||Agarwal, S. and Sureka, A.||Article|
|Online video sharing platforms such as YouTube contains several videos and users promoting hate and extremism. Due to low barrier to publication and anonymity, YouTube is misused as a platform by some users and communities to post negative videos disseminating hatred against a particular religion, country or person. We formulate the problem of identification of such malicious videos as a search problem and present a focused-crawler based approach consisting of various components performing several tasks: search strategy or algorithm, node similarity computation metric, learning from exemplary profiles serving as training data, stopping criterion, node classifier and queue manager. We implement two versions of the focused crawler: best-first search and shark search. We conduct a series of experiments by varying the seed, number of n-grams in the language model based comparer, similarity threshold for the classifier and present the results of the experiments using standard Information Retrieval metrics such as precision, recall and F-measure. The accuracy of the proposed solution on the sample dataset is 69% and 74% for the best-first and shark search respectively. We perform characterization study (by manual and visual inspection) of the anti-India hate and extremism promoting videos retrieved by the focused crawler based on terms present in the title of the videos, YouTube category, average length of videos, content focus and target audience. We present the result of applying Social Network Analysis based measures to extract communities and identify core and influential users.|
A War of Keywords: How Extremists are Exploiting the Internet and What to do About It
|2016||Ahmed, M. and George, FL.||Report|
|This research centred on three layers of analysis: Firstly, understanding|
the keywords, or search terms, people use to
find information on Google; secondly, looking at the data
demonstrating links going into a selection of known extremist
websites in order to understand their relationships
with other websites;
and thirdly, analysing the content of
Google search results pages to understand the placement of extremist and counter-narrative content within search results for relevant keywords. The areas of analysis represent
important aspects related to the broader internet and,
when combined, gave the opportunity to get a snapshot of
extremist content beyond the realm of social media.
The results produced by this multi-faceted approach provide
an overview of extremist content online and shed
much-needed light on the impact and effectiveness of online
Social media and counterterrorism strategy
|With the rise of Islamic State of Iraq and Syria (ISIS), the issue of domestic radicalisation has taken on renewed significance for Western democracies. In particular, attention has been drawn to the potency of ISIS engagement on social media platforms like Twitter and Facebook. Several governments have emphasised the importance of online programs aimed at undermining ISIS recruitment, including the use of state-run accounts on a variety of social media platforms to respond directly to ISIS messaging. This article assesses the viability of online counter-radicalisation by examining the effectiveness of similar programs at the US State Department over the last decade. The article argues that governments attempting to counter online radicalisation of their domestic populations must take seriously the significant shortcomings of these State Department programs. The most relevant issue in this regard is the recurring problem of credibility, when the authenticity of government information is undercut by the realities of foreign policy practice, and existing perceptions of hypocrisy and duplicity are reinforced in target audiences.|
The Stream: Are the Roots of Radicalisation Online?
Now on Twitter, Facebook: Jihadi Media Foundation Fursan Al-Balagh
|Media foundations connected to jihadi groups and jihad-supporting organizations, which once released their productions – videos, statements, and more – over jihadi forums, have turned to social media websites, mainly Facebook and Twitter, because of these forums' inability to provide reliable means for communication, interaction, and publication due to constant and often lengthy disruption of their online presence. This report discusses official and unofficial jihadi media foundations' presence on Facebook and Twitter, and identifies the foundations' accounts and provide background information regarding their affiliation and activities.|
Mobilisation and Violence in the New Media Ecology: the Dua Khalil Aswad and Camilia Shehata Cases
|2012||Al-Lamia, M., Hoskins, A. and O'Loughlin, B.||Journal|
|This article examines two cases in which political groups sought to harness the new media ecology to mobilise and justify acts of violence to public audiences and to supporters. In each case, a woman's suffering is presented and instrumentalised. However, the new media ecology offers an increasingly irregular economy of media modulation: digital footage may emerge today, in a year or never, and it may emerge anywhere to anyone. The cases analysed here allow for reflection on the tension between contingency and intentionality as that irregular economy brings uncertainty for the political actors involved. Dua Khalil Aswad, an Iraqi teenager of the Yazidi faith, was stoned to death by a Yazidi mob consisting of tens of men, mostly her relatives. One Yazidi uploaded a film of the killing. This led to violent reprisals against the Yazidis. Camilia Shehata is a young Coptic Egyptian who, after allegedly converting to Islam, was returned to her church with the help of Egyptian security forces and kept in hiding despite public protests. Extremists in Iraq and Egypt seized on the Shehata case to justify violence against Christians. In both instances, the irregular emergence of digital content and its remediation through these media ecologies enabled distributed agency in ways that empowered and confounded states, terrorists and citizens.|
Turning Away From the Truth: Critique Of Hamami
|Demystifying the Abu Mansur Saga|